Secured Login Authentication on Key Attackers

Abstract

An innovative solution is proposed to avoid the problem such as password security at application layer. For password security all lower case characters, upper case characters, special characters and digits in password could be encoded with a random single digit integer number and presented to the user through a Login input interface module. If a valid user enters his password in the form of the sequence code or numeric value from the login input interface module then that describes his password code in place of his actual password characters and for every time solution engine regenerates a new numeric value. When user enters password for each character each time the carriage return key is struck and this approach is known as key logger attack producing and this toughened password is more secure than a conventional password scheme.

Authors and Affiliations

K. Vanitha, M. Manikanta, M. Suresh Kumar

Keywords

Related Articles

Fixture for bundle cutting of tubes and rods in saw cutting machine

Indian public and government undertaking manufacturing sectors have been manufacturing products with the help of conventional type and semi-automatic type machines, jigs, fixtures since their inception.it is impossible...

A Survey Yojana on Help Desk App

Yojna Help Desk App will help to give alerts about government’s new schemes & new jobs opening. It will also reduce our time & confusion about all exams date & schedule. It will make aware of new schemes and will easily...

Heat Transfer Augmentation through Different Passive Intensifier Methods (Review)

In most of the previous experimental and numerical studies empirical correlations for duct flow with straight channel has been investigated and corresponding heat transfer and pressure drop are reported, very few paper...

Non Determinism of Finite Automata

The basic finite automata model has been extended over the years with different acceptancemodes (nondeterminism, alternation), new or improved devices (two-way heads, Pebbles, nested pebbles) and with cooperation. None...

QRS Detection and Data Compression Based On Adaptive Algorithm in a Wireless Wearable Sensor

The paper presents the QRS detection and data compression based on LMS algorithm in a wireless wearable sensor. The proposed method achieves a high sensitivity of 99.64% and positive prediction of 99.81% ECG database. T...

Download PDF file
  • EP ID EP23953
  • DOI http://doi.org/10.22214/ijraset.2017.4247
  • Views 290
  • Downloads 10

How To Cite

K. Vanitha, M. Manikanta, M. Suresh Kumar (2017). Secured Login Authentication on Key Attackers. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(4), -. https://europub.co.uk/articles/-A-23953